ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-CDF0AC747623
|
Infrastructure Scan
ADDRESS: 0xa5dbad78a2a16cb1f09d026a9ea8d0851a7304c3
DEPLOYED: 2026-05-11 21:23:59
LAST_TX: 2026-05-11 21:38:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-4. [NET] Handshake with node 0x18f449d3 successful. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Mocking MSG.SENDER as 0x0bdc5d41d17b01248615f74b4485b5e6d3332eee. [TRACE] Return data: 0xd72acff7… [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Log signature: 7dbd7622728b7758ebfc4b288fa15b111555f68a5219d12db7f36b72755f31a4.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x943a421a7ad6f21c96b754693f0b0097ac79c255 0x60b9e6376b9093baa6434e594f74c8d3d1d101db 0xc780214d60b80c3e58391853846062f84aa28093 0xec631ee8005bd7e70686fddfd8b1dafeadbfa236 0xffe9b93a9315ebbcddc328504f101b671632c0fe 0x664e073da2daec580ebb604cbb2f077b6a5f87bf 0x63068e5c05e9bafc55e8404068adb0a752d51f11 0xac8d314d556f3ca55de54223de3674ca3023bccb 0x0f9aedb2f435130208df7a9f2eff2732089c2d8f 0xf30c3fe015dd38bb11f03df815f5e58736a5f52a 0x6be9a507fb12e1843e6066ebf5ec7efff4f414b3 0x5b421c8d4a2f4a1a6ba13d0af2c4d87dab3eee74 0x78a2dd03819d2d2cedbe4577237993b78950c610 0x74eadba6b01e4f8683f7a9aa869c5ac3dbcaada4 0xd48daa1410a595489dc95b12b5fc769e923e8cba 0x957b566083f72d582a21b6c7c72be465fd22ab9b 0x43cd4294788044cc5b4dd90e0ec80e054f30862f 0x7dba7048d172251c3b70cbb01ceec1012e386abf 0x81fe78adf044453c60752b6cab70f0bfa98dfe81 0x60a11a12f91e52ce7bacb6861987bfde56eb389d